Millions of workers today use corporate and personal laptops, smartphones, tablets and other mobile devices not only for business use, but also for private. With so many mobiles devices accessing enterprise networks, mobile data security has become one of the top challenges for IT Security professionals: corporate data can go anywhere and ultimately goes everywhere, and if you can’t manage it nor track it, then it becomes really difficult to protect it!
So when it comes to data loss and data theft with mobile workers, there are basically four points of vulnerability:
Data at rest on back-end systems
Data in flight between the mobile user and the back-end services or system
Data on the mobile device itself
Data to apps...

Our subject matter experts for Statistica and the Information Management Group (IMG) keep busy, staying abreast of current trends with big data and small data, predictive software and real-world analytics solutions. And they frequently comment in industry publications, professional forums and blogs-...

Security controls are at the heart of a solid governance, risk and compliance (GRC) program.
Security controls are processes, procedures, settings, filters, architectural structures, mechanisms or activities that keep risk within acceptable limits. To help organizations prioritize and focus on the...

(Please visit the site to view this video)
More and more organizations are moving away from IBM Lotus Notes in favor of the Microsoft platform. Most start by migrating email from Notes to Microsoft Exchange . Next, they consider migrating the applications that they’ve developed in Notes to SharePoint...

End users want what they want: an IT system that is always on and a hero (you) to deliver it. That’s why managing expectations is almost as key to happiness in an IT environment as it is in life. Over 75 percent of SMB customers surveyed say they expect less than one hour of data loss for any outage...

Over the past few weeks, we have been talking about how resellers can increase their margins through backup and recovery solutions, and have offered this CRN report - “Reseller Attitudes to Backup and Recovery Solutions” – as additional information to help partners and resellers make...

Cloud portability is increasingly becoming important, as more and more workloads get moved to public clouds. Cloud portability means that the application or service can be migrated to new vendor or private cloud without substantial effort and investment. This makes it not only possible to utilize private...

There has been a huge market demand recently for a solution to migrate personal storage content (i.e. Google Drive, home folders, My Sites, etc.) to OneDrive for Business and Office 365 .
Well thanks to the newly released Migration Suite for SharePoint 4.8 , customers and partners can now:
Import...

In this live panel discussion, David Sengupta, Microsoft MVP and chief architect, Dell Software will moderate a conversation with a panel of experts from Microsoft and Dell as they discuss:
Where have we been? A brief history of Exchange
Where are we now and what's on the horizon?
Exchange...

We’ve posted earlier about how hackers get into your systems and steal data from your endpoints, and then how they monetize this stolen information. If you have thousands of unsecured mobile endpoints on your network, it means there are equal numbers of opportunities for hackers to breach your...